Protect yourself.

War Cyberspace, Cybersecurity, Cyber Warfare Protect yourself. Protect yourself.  McAfee 2017 Total Protection - 5 Devices [Online Code] $24.99$79.99  (245)  Webroot Internet Security Complete + Antivirus 2017 |… $36.00  (1060)  Norton Security Deluxe 5 Device PC/Mac $39.99$79.99  (2900)  SOFTWARE to block RANSOMWARE -- VEEDogTM… $29.95$69.95  (11) All Search Amazon  Go Ads by Amazon   How do we stop Russia’s and China’s cyber-meddling in our affairs?  Should this be considered an act of war? > Big Questions Do you have nothing to hide?  Are you sure? Should the NSA be broken up? big ideas  Are we moving towards a surveillance state? in general: anti-surveillance: Electronic Frontier Foundation | russian cyber espionage: Fancy Bear | you’ve been hacked: Peace | ransomware: KeRanger | conferences & training: blackhat | critical infrastructure: carmaggedon | cyber armies | education & awareness: esetfoundation, Natonal Cyber Security Hall of Fame | news & analysis: Schneier on Security | Amnesia Carey | Cybersecurity and Cyberwar Singer | Cyber War Clarke | Intelligence Gathering and the Unowned Internet Berkman | The Director Ignatius

Absorption of new technologies accelerates

big picture Technology Who are the world's most valuable tech companies? We wanted flying cars, instead we got 140 characters founders fund Is it evil? How fast is technology accelerating? - The Universe was created 13.8 billion years ago - Humans arrived 200,000 years ago - Machines arrived 100 years ago - What’s the next milestone? Development of Technology Elements of Technology Fields of Technology  in general: mapping the future: Metaculus > Future | early adoption: leveling the playing field | kids: uTech | news: re/code

Ponemon Research Institute

Development of Technology Trustworthiness How do you measure/validate trust in the cybersecurity of the enterprise? > Cybersecurity How can big-city police (e.g. Baltimore) and neighborhoods-at-risk rebuild trust in each other? How do you know if someone is trying to win, or lose? Parameters of trust Trust is built over a marriage, a career, a lifetime, but can be lost in a second. sp Confidence Reliability Integrity: trustworthiness over time Privacy Resiliency: Antifragile: Things That Gain from Disorder Taleb Skepticism and Conspiracy Theory Terms of Service: monitoring: docracy | ratings: crowd ratings Truth (correctness) photos: A bullet can kill a man, but a lying camera can kill a nation. lying: There is no defense against lying. sp | white lies vs black lies Technologies of trust big data: cyber-physical systems: terraechos certifications: kikscore drug testing federations: InCommon passwords: keepersecurity products & services relationship mining: intersecting people sp | Relationship Science scoring trust: TrustCloud Fields of Application human-machine relationships marketing: celebrity DBI DBI= 0.6*(Awareness) + 0.4*((Appeal+ Breakthrough+Trend-Setter +Influence + Trust + Endorsement + Aspiration)/7) Societal Risk Management (SRM): graduate program Software: Top 25 Most Dangerous Software Errors in general: advertising: evidon, doubleverify | medical devices: Open Medical Device Research Library omdrl.org | electronic voting: Do electronic voting machines improve the voting process? | Failed States Index: fundforpeace | financial institutions: credit cards, financialtrustindex | internet |sports: Lance Armstrong, research | wellness: Dr. Oz, Food Babe untrustworthy: corporations: Volkswagen | government: NSA | nonprofits: FIFA, Red Cross | politicians: Chris Christie, Hillary Clinton articles, books: ubiquitous: Trust is the glue that holds us together sp | Dare: Accepting the Challenge of Trusting Leadership Weiss | Extreme Trust: Honesty as a Competitive Advantage Peppers | Just How Fragile Are America’s Bridges? Sofge | Likeonomics Bhargava | The Fix: Soccer and Organized Crime Hill Crime

How do you validate trust in the cybersecurity of the enterprise?